Singh / Tiwary / van ’t Klooster | Intelligent Human Computer Interaction | Buch | 978-3-031-88704-8 | sack.de

Buch, Englisch, 459 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g

Reihe: Lecture Notes in Computer Science

Singh / Tiwary / van ’t Klooster

Intelligent Human Computer Interaction

16th International Conference, IHCI 2024, Twente, The Netherlands, November 13-16, 2024, Revised Selected Papers, Part I
Erscheinungsjahr 2025
ISBN: 978-3-031-88704-8
Verlag: Springer Nature Switzerland

16th International Conference, IHCI 2024, Twente, The Netherlands, November 13-16, 2024, Revised Selected Papers, Part I

Buch, Englisch, 459 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-031-88704-8
Verlag: Springer Nature Switzerland


This volume LNCS 15557 constitutes the refereed proceedings of 16th International Conference on Intelligent Human Computer Interaction, IHCI 2024, held in Twente, The Netherlands, during November 13-16, 2024.

The 37 full papers and 2 short papers were carefully reviewed and selected from 107 submissions. They were categorized under the topical sections as follows:

Learning in healthcare and wellbeing

Robots and conversation agents

Physical world and Posters

Human factors

Algorithims and computer vision

Human factors in cybersecurity

Singh / Tiwary / van ’t Klooster Intelligent Human Computer Interaction jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


A VR experience exposing the hidden curriculum of the operating room a case study.- LifeCharger SynCare Mobile App: a preliminary usability study.- From Theory to Practice Simulation in Anesthesiology through Active Learning Experiences.- Methods for Optimizing Diagnostic Data for Patients with a Given Condition.- An Exploration of Phantom Touch as a Design Aspect to Enhance Wellbeing and Safety in Social VR.- Predictive Analytics for Stress Management in Nursing A Machine Learning Approach Using Wearable IoT Devices.- Robot-to-Robot Collaborative Knowledge Sharing with Human Operators under Constraint Resources through Connotative 2.5D Mapping.- Context aware Robotic Assistance for Workers using Intention Recognition and Semantic Digital Twin.- Conversational Agent Design A Comprehensive Analysis of Research from Leading Conferences.- Enhancing Firefighting Robot’s Capability A Comprehensive Implementation for Enhancing Firefighting Robot’s Operations.- A Novel Framework for Collaborative Knowledge Sharing and Learning for Disaster Response Robots.- More Human, Less Bot How Anthropomorphism Impacts User Experience in Customer Support Chatbots.- ‘I prefer robot cats!’ Reflections on robot animal like morphology from an in the wild Child Robot Interaction workshop.- Pipeline leak detection Leveraging Acoustic Emission Signal Processing and Machine Learning.- Application of Machine Learning Techniques for Leak Detection in a Horizontal Pipeline Transporting a Water Glycerol Mixture.- Connected lives Revolutionizing health and social interaction with wearable technology in India.- Online Monitoring System of Groundwater in the Aral Region Based on the Internet of Things.- Enhancing Meal Search Engine for Fitness Applications using Semantic Search with Sentence Transformers.- Addressing Graphviz File Generation Issue in CPN Tools: A Java based Solution.- What Does “Remote Driving” Mean for People A Futurespective Design Approach.- Controller adaptive Digital Assistant (CODA) Interim conclusions on the development of a new ATC system.- Reimagining the Utility of Dash Cam Data in Autonomous Travel Contexts A Service Design Proposal.- Keyframe Extraction based on Large Vision Transformer Model and kNN DBSCAN Clustering.- Improving Polyps Segmentation in Colonoscopy Images using Modified UNet3+ Network.- Scheduling for Lecturers using Genetic Algorithm with Fuzzy Constraints.- No Code Computer Vision.- Transfer Learning to Identify Multilingual Machine Genenrated Text.- A Novel Preprocessing Method for Transforming Federal Sentencing Data to Ensure Unbiased AI Adjudication Research Using Large Language Models.- Computational Analysis of User Experience of Password-Based Authentication Systems.- Computational Analysis of Human Factors in Spear Phishing Attacks An Adaptive Network Model.- Analysing the Rise of Biohacking in a Tech Driven City Assessing Risks through Adaptive Network Modeling.- An Adaptive Network Model to Analyse Cyber Security Understanding Cyber Threats in Financial Institutions.- Understanding Insider Threats Behaviour An Adaptive Network Model of The Evolution of an Insider Threat.- Organizational Response to APT Attacks Computational Analysis by Behavioral Network Modelling.- Adversarial Attack Detection In Intrusion Detection System Using Machine Learning.- Enhancing Data Privacy with Lattice-Based Encryption Technique.- Improving Threat Recognition in X-ray Security Inspection using Transformers.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.